summaryrefslogtreecommitdiff
path: root/sk-usbhid.c
Commit message (Expand)AuthorAgeFilesLines
* upstream: Remove compat code for OpenSSL < 1.1.*dtucker@openbsd.org2023-03-281-9/+1
* upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flagdjm@openbsd.org2022-09-141-9/+1
* upstream: sk-usbhid: fix key_lookup() on tokens with built-in UVdjm@openbsd.org2022-09-021-2/+11
* upstream: remove incorrect check that can break enrolling adjm@openbsd.org2022-08-191-5/+1
* on Cygwin, prefer WinHello FIDO deviceDamien Miller2022-08-171-0/+4
* upstream: add an extra flag to sk_probe() to indicate whether we'redjm@openbsd.org2022-08-171-6/+6
* Revert "check_sk_options: add temporary WinHello workaround"Corinna Vinschen2022-08-121-9/+0
* fido_dev_is_winhello: return 0, not "false"Corinna Vinschen2022-08-121-1/+1
* Give unused param a name.Darren Tucker2022-08-081-1/+1
* sk_sign: set FIDO2 uv attribute explicitely for WinHelloCorinna Vinschen2022-08-051-0/+8
* check_sk_options: add temporary WinHello workaroundCorinna Vinschen2022-08-051-0/+9
* compat code for fido_dev_is_winhello()Corinna Vinschen2022-08-051-0/+8
* upstream: sk-usbhid: preserve error code returned by key_lookup()djm@openbsd.org2022-07-201-2/+2
* upstream: when enrolling a resident key on a security token, checkdjm@openbsd.org2022-07-201-2/+69
* upstream: Don't leak SK device. Patch from Pedro Martelletto viadtucker@openbsd.org2022-04-291-1/+2
* fix typos in previouspedro martelletto2022-02-071-3/+3
* compat code for fido_assert_set_clientdata()Damien Miller2022-02-071-2/+26
* upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() insteaddjm@openbsd.org2022-02-071-28/+33
* upstream: better error message for FIDO keys when we can't matchdjm@openbsd.org2021-12-201-1/+4
* upstream: improve the testing of credentials against inserted FIDOdjm@openbsd.org2021-12-031-2/+4
* upstream: move check_sk_options() up so we can use it earlierdjm@openbsd.org2021-12-031-43/+43
* upstream: Many downstreams expect ssh to compile as non-C99...deraadt@openbsd.org2021-11-061-3/+3
* upstream: Better handle FIDO keys on tokens that provide userdjm@openbsd.org2021-11-031-9/+78
* upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org2021-10-281-9/+26
* fix FIDO key support for !OPENSSL_HAS_ECC caseDamien Miller2021-10-011-0/+9
* upstream: unbreak FIDO sk-ed25519 key enrollment for OPENSSL=no builds;djm@openbsd.org2021-10-011-2/+6
* upstream: Hash challenge supplied by client during FIDO key enrollmentdjm@openbsd.org2021-05-311-4/+9
* upstream: make names in function prototypes match those indjm@openbsd.org2021-02-181-2/+2
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-3/+3
* upstream: want time.h here toodjm@openbsd.org2020-10-031-1/+2
* upstream: when writing an attestation blob for a FIDO key, record alldjm@openbsd.org2020-09-091-1/+12
* configure.ac: fix libfido2 back-compatpedro martelletto2020-09-021-1/+1
* upstream: Add RCS IDs to the few files that are missing them; fromdjm@openbsd.org2020-08-311-0/+1
* tweak back-compat for older libfido2Damien Miller2020-08-271-6/+20
* upstream: skip a bit more FIDO token selection logic when only adjm@openbsd.org2020-08-271-1/+8
* degrade semi-gracefully when libfido2 is too oldDamien Miller2020-08-271-0/+21
* upstream: preserve verify-required for resident FIDO keysdjm@openbsd.org2020-08-271-2/+4
* upstream: major rework of FIDO token selection logicdjm@openbsd.org2020-08-271-252/+326
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-12/+26
* upstream: we are still aiming for pre-C99 ...deraadt@openbsd.org2020-05-271-2/+2
* upstream: Enable credProtect extension when generating a residentdjm@openbsd.org2020-05-271-0/+57
* upstream: always call fido_init(); previous behaviour only calleddjm@openbsd.org2020-05-271-6/+11
* wrap sha2.h inclusion in #ifdef HAVE_SHA2_HDamien Miller2020-05-011-0/+2
* upstream: when signing a challenge using a FIDO toke, perform thedjm@openbsd.org2020-05-011-3/+32
* upstream: changes to support FIDO attestationdjm@openbsd.org2020-01-291-0/+1
* upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org2020-01-261-72/+27
* upstream: missing else in check_enroll_options()djm@openbsd.org2020-01-061-1/+1
* upstream: fix error messagedjm@openbsd.org2020-01-061-2/+1
* upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org2020-01-061-42/+152
* upstream: translate and return error codes; retry on bad PINdjm@openbsd.org2019-12-301-17/+32